Genel, Güvenlik
Fortigate Multiple İnterfaces Policies Nedir ?

Fortigate Multiple İnterfaces Policies Nedir ?

Herkese Merhaba,

Fortigate’ in Multiple İnterfaces Policies özelliğinden bahsedeceğiz. Ne işimize yarar diye düşünürsek normalde source ve destination interface eklediğimiz kuralları düşünün ve onu sources ve destinations olarak değiştirelim kısaca kural kalabalığından kurtarıyor diyebiliriz.

Dezavantaj olarak ise (makalenin sonunda farkı göstereceğim) kural ekranımızdaki default ta gelen INTERFACE PAIR görünümünü kapatıyor ve BY SEQUENCE moduna geçiyor. Çünkü kuralımız tek bir interface olmayacağı için bu ayarlama yapılamıyor.

Örnek olarak bir yere VPN vermek istiyorsunuz. Port1 ve Port2 interfaceleri ayrı networkler olduğunu düşünelim. Bunun için VPN to Port1 ve VPN to Port2 diye 2 ayrı kural yapmam lazım. Bu anlatacağım özellik sayesinde tek kural ile VPN to Port1 and Port2 yapabiliyor olacağım ve tek kural da işimi çözmüş olacağım .

Nasıl yapıldığına geçelim;

İlk olarak System > Feature Select sayfasına gelip MULTIPLE INTERFACE POLICIES özelliğini aktif ediyoruz.

Bunu yaptıktan sonra yeni bir kural oluşturuyoruz.

Gördüğünüz gibi birden fazla source ve destination interface e sahip bir kural oluşturduk ok diyerek kaydediyoruz.

Ve gördüğünüz gibi kuralımız belirlediğimiz portlarla oluştu.

İşinize Yaraması Dileğiyle..

BY SEQUENCE görünümü

INTERFACE PAIR görünümü

Share this Story

Related Posts

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

The Hacker News

  • U.S. Charges WikiLeaks' Julian Assange With Violating Espionage Act
    by [email protected] (Swati Khandelwal) on 24 Mayıs 2019 at 09:11

    The United States Justice Department has unveiled charges against WikiLeaks founder Julian Assange with 17 new counts on the alleged violation of the Espionage Act by publishing classified information through WikiLeaks website. If convicted for all counts, Assange could face a maximum sentence of 175 years in U.S. prison for his "alleged role in one of the largest compromises of classified […]

  • Update: Hacker Disclosed 4 New Microsoft Zero-Day Exploits in Last 24 Hours
    by [email protected] (Mohit Kumar) on 23 Mayıs 2019 at 14:49

    Less than 24 hours after publicly disclosing an unpatched zero-day vulnerability in Windows 10, the anonymous hacker going by online alias "SandboxEscaper" has now dropped new exploits for two more unpatched Microsoft zero-day vulnerabilities. The two new zero-day vulnerabilities affect Microsoft's Windows Error Reporting service and Internet Explorer 11. Just yesterday, while releasing a […]

  • 5 Cybersecurity Tools Every Business Needs to Know
    by [email protected] (Exclusive Deals) on 23 Mayıs 2019 at 13:41

    Cybersecurity experts all echo the same thing – cyber attacks are going to get more rampant, and they will continue to pose severe threats against all technology users. Businesses, in particular, have become prime targets for cybercriminals due to the nature of data and information they process and store. 2018 saw a slew of data breaches targeting large enterprises that resulted in the theft […]

  • Tor Browser for Android — First Official App Released On Play Store
    by [email protected] (Wang Wei) on 23 Mayıs 2019 at 09:18

    Wohooo! Great news for privacy-focused users. Tor Browser, the most popular privacy-focused browser, for Android is finally out of beta, and the first stable version has now arrived on Google Play Store for anyone to download. The Tor Project announced Tuesday the first official stable release of its ultra-secure internet browser for Android devices, Tor Browser 8.5—which you can now […]

  • Hacking and Cyber Security Certification Training Bundle 2019 (10 Courses)
    by [email protected] (Exclusive Deals) on 22 Mayıs 2019 at 13:30

    The world of cybersecurity is fast-paced and ever-changing. New attacks are unleashed every day, and companies around the world lose millions of dollars as a result. The only thing standing in the way of cybercrime is a small army of ethical hackers. These cybersecurity experts are employed to find weaknesses before they can be exploited. It's a lucrative career, and anyone can find work […]